From: Milan Broz When user sets dm-crypt over loop device and the loop thread processing bios calls bio_endio later than the dm-crypt mapping is destroyed (including mempool for dm io request), the endio can cause this OOPs: (mempool_free from already destroyed mempool). [ 70.381058] EIP is at mempool_free+0x12/0x6b ... [ 70.381058] Process loop0 (pid: 4268, ti=cf3b2000 task=cf1cc1f0 task.ti=cf3b2000) ... [ 70.381058] Call Trace: [ 70.381058] [] ? crypt_dec_pending+0x5e/0x62 [dm_crypt] [ 70.381058] [] ? crypt_endio+0xa2/0xaa [dm_crypt] [ 70.381058] [] ? crypt_endio+0x0/0xaa [dm_crypt] [ 70.381058] [] ? bio_endio+0x2b/0x2e [ 70.381058] [] ? dec_pending+0x224/0x23b [dm_mod] [ 70.381058] [] ? clone_endio+0x79/0xa4 [dm_mod] [ 70.381058] [] ? clone_endio+0x0/0xa4 [dm_mod] [ 70.381058] [] ? bio_endio+0x2b/0x2e [ 70.381058] [] ? loop_thread+0x380/0x3b7 [ 70.381058] [] ? do_lo_send_aops+0x0/0x165 [ 70.381058] [] ? autoremove_wake_function+0x0/0x33 [ 70.381058] [] ? loop_thread+0x0/0x3b7 Fix it by adding reference counter into crypt config and wait till all endio operations finish. [AGK: Not convinced this is necessary yet. Want a simpler version that just moves the mempool_free() trying first.] Signed-off-by: Milan Broz --- drivers/md/dm-crypt.c | 12 ++++++++++++ 1 files changed, 12 insertions(+) Index: linux-2.6.29-rc7/drivers/md/dm-crypt.c =================================================================== --- linux-2.6.29-rc7.orig/drivers/md/dm-crypt.c 2009-03-12 14:34:48.000000000 +0000 +++ linux-2.6.29-rc7/drivers/md/dm-crypt.c 2009-03-12 14:37:11.000000000 +0000 @@ -22,6 +22,7 @@ #include #include #include +#include #include @@ -96,6 +97,8 @@ struct crypt_config { struct workqueue_struct *io_queue; struct workqueue_struct *crypt_queue; + atomic_t pending; + /* * crypto related data */ @@ -581,6 +584,7 @@ static void crypt_dec_pending(struct dm_ } mempool_free(io, cc->io_pool); + atomic_dec(&cc->pending); } /* @@ -1129,6 +1133,8 @@ static int crypt_ctr(struct dm_target *t goto bad_crypt_queue; } + atomic_set(&cc->pending, 0); + ti->private = cc; return 0; @@ -1164,6 +1170,9 @@ static void crypt_dtr(struct dm_target * destroy_workqueue(cc->io_queue); destroy_workqueue(cc->crypt_queue); + while (atomic_read(&cc->pending)) + msleep(1); + if (cc->req) mempool_free(cc->req, cc->req_pool); @@ -1185,8 +1194,11 @@ static void crypt_dtr(struct dm_target * static int crypt_map(struct dm_target *ti, struct bio *bio, union map_info *map_context) { + struct crypt_config *cc = ti->private; struct dm_crypt_io *io; + atomic_inc(&cc->pending); + io = crypt_io_alloc(ti, bio, bio->bi_sector - ti->begin); if (bio_data_dir(io->base_bio) == READ)